ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/ircd-hybrid/trunk/src/server.c
Revision: 3449
Committed: Thu May 1 19:14:42 2014 UTC (11 years, 3 months ago) by michael
Content type: text/x-csrc
File size: 29767 byte(s)
Log Message:
- server.c:hunt_server(): save extra has_wildcards() call everytime hunt_server()
  finds a client/server in the hash tables.

File Contents

# User Rev Content
1 adx 30 /*
2 michael 2916 * ircd-hybrid: an advanced, lightweight Internet Relay Chat Daemon (ircd)
3 adx 30 *
4 michael 2916 * Copyright (c) 1997-2014 ircd-hybrid development team
5 adx 30 *
6     * This program is free software; you can redistribute it and/or modify
7     * it under the terms of the GNU General Public License as published by
8     * the Free Software Foundation; either version 2 of the License, or
9     * (at your option) any later version.
10     *
11     * This program is distributed in the hope that it will be useful,
12     * but WITHOUT ANY WARRANTY; without even the implied warranty of
13     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14     * GNU General Public License for more details.
15     *
16     * You should have received a copy of the GNU General Public License
17     * along with this program; if not, write to the Free Software
18     * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
19     * USA
20     */
21    
22 michael 2916 /*! \file s_serv.c
23     * \brief Server related functions.
24     * \version $Id$
25     */
26    
27 adx 30 #include "stdinc.h"
28     #ifdef HAVE_LIBCRYPTO
29     #include <openssl/rsa.h>
30     #include "rsa.h"
31     #endif
32 michael 1011 #include "list.h"
33 adx 30 #include "client.h"
34     #include "event.h"
35     #include "hash.h"
36     #include "irc_string.h"
37     #include "ircd.h"
38     #include "ircd_defs.h"
39     #include "s_bsd.h"
40     #include "numeric.h"
41     #include "packet.h"
42 michael 1309 #include "conf.h"
43 michael 3347 #include "server.h"
44 michael 1309 #include "log.h"
45 michael 3347 #include "user.h"
46 adx 30 #include "send.h"
47     #include "memory.h"
48 michael 2916 #include "channel.h"
49 michael 1243 #include "parse.h"
50 adx 30
51     #define MIN_CONN_FREQ 300
52    
53 michael 2156 dlink_list flatten_links;
54 adx 30 static dlink_list cap_list = { NULL, NULL, 0 };
55     static CNCB serv_connect_callback;
56    
57    
58     /*
59     * write_links_file
60     *
61     * inputs - void pointer which is not used
62     * output - NONE
63     * side effects - called from an event, write out list of linked servers
64     * but in no particular order.
65     */
66     void
67 michael 2156 write_links_file(void *notused)
68 adx 30 {
69 michael 2156 FILE *file = NULL;
70 michael 2216 dlink_node *ptr = NULL, *ptr_next = NULL;
71 michael 3215 char buff[IRCD_BUFSIZE] = "";
72 adx 30
73 michael 2156 if ((file = fopen(LIPATH, "w")) == NULL)
74 adx 30 return;
75    
76 michael 2156 DLINK_FOREACH_SAFE(ptr, ptr_next, flatten_links.head)
77 adx 30 {
78 michael 2156 dlinkDelete(ptr, &flatten_links);
79     MyFree(ptr->data);
80     free_dlink_node(ptr);
81 adx 30 }
82    
83     DLINK_FOREACH(ptr, global_serv_list.head)
84     {
85 michael 1325 const struct Client *target_p = ptr->data;
86 adx 30
87 michael 2156 /*
88     * Skip hidden servers, aswell as ourselves, since we already send
89     * ourselves in /links
90     */
91     if (IsHidden(target_p) || IsMe(target_p))
92 adx 30 continue;
93    
94 michael 1851 if (HasFlag(target_p, FLAGS_SERVICE) && ConfigServerHide.hide_services)
95     continue;
96    
97 michael 1545 /*
98     * Attempt to format the file in such a way it follows the usual links output
99 adx 30 * ie "servername uplink :hops info"
100     * Mostly for aesthetic reasons - makes it look pretty in mIRC ;)
101     * - madmax
102     */
103 michael 2156 snprintf(buff, sizeof(buff), "%s %s :1 %s", target_p->name,
104     me.name, target_p->info);
105 michael 2212 dlinkAddTail(xstrdup(buff), make_dlink_node(), &flatten_links);
106 michael 2156 snprintf(buff, sizeof(buff), "%s %s :1 %s\n", target_p->name,
107     me.name, target_p->info);
108 adx 30
109 michael 1325 fputs(buff, file);
110 adx 30 }
111    
112 michael 1325 fclose(file);
113 adx 30 }
114    
115 michael 2216 void
116     read_links_file(void)
117     {
118     FILE *file = NULL;
119     char *p = NULL;
120 michael 3215 char buff[IRCD_BUFSIZE] = "";
121 michael 2216
122     if ((file = fopen(LIPATH, "r")) == NULL)
123     return;
124    
125     while (fgets(buff, sizeof(buff), file))
126     {
127 michael 3246 if ((p = strchr(buff, '\n')))
128 michael 2216 *p = '\0';
129    
130     dlinkAddTail(xstrdup(buff), make_dlink_node(), &flatten_links);
131     }
132    
133     fclose(file);
134     }
135    
136 adx 30 /* hunt_server()
137     * Do the basic thing in delivering the message (command)
138     * across the relays to the specific server (server) for
139     * actions.
140     *
141     * Note: The command is a format string and *MUST* be
142     * of prefixed style (e.g. ":%s COMMAND %s ...").
143     * Command can have only max 8 parameters.
144     *
145     * server parv[server] is the parameter identifying the
146     * target server.
147     *
148     * *WARNING*
149     * parv[server] is replaced with the pointer to the
150     * real servername from the matched client (I'm lazy
151     * now --msa).
152     *
153     * returns: (see #defines)
154     */
155     int
156 michael 3156 hunt_server(struct Client *source_p, const char *command,
157 michael 1857 const int server, const int parc, char *parv[])
158 adx 30 {
159     struct Client *target_p = NULL;
160     struct Client *target_tmp = NULL;
161     dlink_node *ptr;
162    
163 michael 1344 /* Assume it's me, if no server */
164     if (parc <= server || EmptyString(parv[server]))
165     return HUNTED_ISME;
166 adx 30
167 michael 1652 if (!strcmp(parv[server], me.id) || !match(parv[server], me.name))
168 michael 1344 return HUNTED_ISME;
169    
170 adx 30 /* These are to pickup matches that would cause the following
171     * message to go in the wrong direction while doing quick fast
172     * non-matching lookups.
173     */
174     if (MyClient(source_p))
175 michael 1169 target_p = hash_find_client(parv[server]);
176 adx 30 else
177 michael 3156 target_p = find_person(source_p, parv[server]);
178 adx 30
179     if (target_p)
180     if (target_p->from == source_p->from && !MyConnect(target_p))
181     target_p = NULL;
182    
183 michael 1169 if (target_p == NULL && (target_p = hash_find_server(parv[server])))
184 adx 30 if (target_p->from == source_p->from && !MyConnect(target_p))
185     target_p = NULL;
186    
187     /* Again, if there are no wild cards involved in the server
188     * name, use the hash lookup
189     */
190     if (target_p == NULL)
191     {
192 michael 3449 if (!has_wildcards(parv[server]))
193 adx 30 {
194 michael 1169 if (!(target_p = hash_find_server(parv[server])))
195 adx 30 {
196 michael 3109 sendto_one_numeric(source_p, &me, ERR_NOSUCHSERVER, parv[server]);
197 michael 2182 return HUNTED_NOSUCH;
198 adx 30 }
199     }
200     else
201     {
202     DLINK_FOREACH(ptr, global_client_list.head)
203     {
204     target_tmp = ptr->data;
205    
206 michael 1652 if (!match(parv[server], target_tmp->name))
207 adx 30 {
208     if (target_tmp->from == source_p->from && !MyConnect(target_tmp))
209     continue;
210     target_p = ptr->data;
211    
212 michael 3156 if (IsRegistered(target_p) && (target_p != source_p->from))
213 adx 30 break;
214     }
215     }
216     }
217     }
218    
219 michael 3246 if (target_p)
220 adx 30 {
221 michael 3246 if (!IsRegistered(target_p))
222 adx 30 {
223 michael 3109 sendto_one_numeric(source_p, &me, ERR_NOSUCHSERVER, parv[server]);
224 adx 30 return HUNTED_NOSUCH;
225     }
226    
227     if (IsMe(target_p) || MyClient(target_p))
228     return HUNTED_ISME;
229    
230 michael 1652 if (match(target_p->name, parv[server]))
231 adx 30 parv[server] = target_p->name;
232    
233 michael 3136 /* This is a little kludgy but should work... */
234 michael 3096 sendto_one(target_p, command, ID_or_name(source_p, target_p),
235 adx 30 parv[1], parv[2], parv[3], parv[4],
236     parv[5], parv[6], parv[7], parv[8]);
237 michael 2134 return HUNTED_PASS;
238 michael 2345 }
239 adx 30
240 michael 3109 sendto_one_numeric(source_p, &me, ERR_NOSUCHSERVER, parv[server]);
241 michael 2134 return HUNTED_NOSUCH;
242 adx 30 }
243    
244     /* try_connections()
245     *
246     * inputs - void pointer which is not used
247     * output - NONE
248     * side effects -
249     * scan through configuration and try new connections.
250     * Returns the calendar time when the next call to this
251     * function should be made latest. (No harm done if this
252     * is called earlier or later...)
253     */
254     void
255     try_connections(void *unused)
256     {
257 michael 1632 dlink_node *ptr = NULL;
258 michael 3335 int confrq = 0;
259 adx 30
260     /* TODO: change this to set active flag to 0 when added to event! --Habeeb */
261     if (GlobalSetOptions.autoconn == 0)
262     return;
263    
264     DLINK_FOREACH(ptr, server_items.head)
265     {
266 michael 3335 struct MaskItem *conf = ptr->data;
267 adx 30
268 michael 1636 assert(conf->type == CONF_SERVER);
269 michael 1632
270 michael 2345 /* Also when already connecting! (update holdtimes) --SRB
271 adx 30 */
272 michael 1632 if (!conf->port ||!IsConfAllowAutoConn(conf))
273 adx 30 continue;
274    
275    
276     /* Skip this entry if the use of it is still on hold until
277     * future. Otherwise handle this entry (and set it on hold
278     * until next time). Will reset only hold times, if already
279     * made one successfull connection... [this algorithm is
280     * a bit fuzzy... -- msa >;) ]
281     */
282 michael 1649 if (conf->until > CurrentTime)
283 adx 30 continue;
284    
285 michael 1632 if (conf->class == NULL)
286 adx 30 confrq = DEFAULT_CONNECTFREQUENCY;
287     else
288     {
289 michael 1632 confrq = conf->class->con_freq;
290 michael 1377 if (confrq < MIN_CONN_FREQ)
291 michael 2134 confrq = MIN_CONN_FREQ;
292 adx 30 }
293    
294 michael 1649 conf->until = CurrentTime + confrq;
295 adx 30
296 michael 3246 /*
297     * Found a CONNECT config with port specified, scan clients
298 adx 30 * and see if this server is already connected?
299     */
300 michael 3246 if (hash_find_server(conf->name))
301 adx 30 continue;
302    
303 michael 1632 if (conf->class->ref_count < conf->class->max_total)
304 adx 30 {
305     /* Go to the end of the list, if not already last */
306 michael 3246 if (ptr->next)
307 adx 30 {
308     dlinkDelete(ptr, &server_items);
309     dlinkAddTail(conf, &conf->node, &server_items);
310     }
311    
312     if (find_servconn_in_progress(conf->name))
313     return;
314    
315 michael 3246 /*
316     * We used to only print this if serv_connect() actually
317 adx 30 * succeeded, but since comm_tcp_connect() can call the callback
318     * immediately if there is an error, we were getting error messages
319     * in the wrong order. SO, we just print out the activated line,
320     * and let serv_connect() / serv_connect_callback() print an
321     * error afterwards if it fails.
322     * -- adrian
323     */
324     if (ConfigServerHide.hide_server_ips)
325 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
326     "Connection to %s activated.",
327 adx 30 conf->name);
328     else
329 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
330     "Connection to %s[%s] activated.",
331 michael 1632 conf->name, conf->host);
332 adx 30
333 michael 1632 serv_connect(conf, NULL);
334 adx 30 /* We connect only one at time... */
335     return;
336     }
337     }
338     }
339    
340     int
341 michael 1115 valid_servname(const char *name)
342     {
343     unsigned int length = 0;
344     unsigned int dots = 0;
345     const char *p = name;
346    
347     for (; *p; ++p)
348     {
349     if (!IsServChar(*p))
350 michael 1118 return 0;
351 michael 1115
352     ++length;
353    
354     if (*p == '.')
355     ++dots;
356     }
357    
358 michael 3246 return dots && length <= HOSTLEN;
359 michael 1115 }
360    
361     int
362 michael 1302 check_server(const char *name, struct Client *client_p)
363 adx 30 {
364     dlink_node *ptr;
365 michael 1632 struct MaskItem *conf = NULL;
366     struct MaskItem *server_conf = NULL;
367 adx 30 int error = -1;
368    
369 michael 3246 assert(client_p);
370 adx 30
371     /* loop through looking for all possible connect items that might work */
372     DLINK_FOREACH(ptr, server_items.head)
373     {
374     conf = ptr->data;
375    
376 michael 1652 if (match(name, conf->name))
377 adx 30 continue;
378    
379     error = -3;
380    
381     /* XXX: Fix me for IPv6 */
382     /* XXX sockhost is the IPv4 ip as a string */
383 michael 2345 if (!match(conf->host, client_p->host) ||
384 michael 1652 !match(conf->host, client_p->sockhost))
385 adx 30 {
386     error = -2;
387    
388 michael 1632 if (!match_conf_password(client_p->localClient->passwd, conf))
389 michael 1414 return -2;
390 adx 30
391 michael 2228 if (!EmptyString(conf->certfp))
392 michael 2229 if (EmptyString(client_p->certfp) || strcasecmp(client_p->certfp, conf->certfp))
393 michael 2228 return -4;
394    
395 michael 1414 server_conf = conf;
396 adx 30 }
397     }
398    
399     if (server_conf == NULL)
400 michael 2182 return error;
401 adx 30
402     attach_conf(client_p, server_conf);
403    
404    
405 michael 3246 if (server_conf)
406 adx 30 {
407     struct sockaddr_in *v4;
408     #ifdef IPV6
409     struct sockaddr_in6 *v6;
410     #endif
411 michael 1632 switch (server_conf->aftype)
412 adx 30 {
413     #ifdef IPV6
414 michael 2345 case AF_INET6:
415 michael 1632 v6 = (struct sockaddr_in6 *)&server_conf->addr;
416 adx 30
417     if (IN6_IS_ADDR_UNSPECIFIED(&v6->sin6_addr))
418 michael 1632 memcpy(&server_conf->addr, &client_p->localClient->ip, sizeof(struct irc_ssaddr));
419 adx 30 break;
420     #endif
421     case AF_INET:
422 michael 1632 v4 = (struct sockaddr_in *)&server_conf->addr;
423 adx 30
424     if (v4->sin_addr.s_addr == INADDR_NONE)
425 michael 2345 memcpy(&server_conf->addr, &client_p->localClient->ip, sizeof(struct irc_ssaddr));
426 adx 30 break;
427     }
428     }
429    
430 michael 2182 return 0;
431 adx 30 }
432    
433     /* add_capability()
434     *
435     * inputs - string name of CAPAB
436     * - int flag of capability
437     * output - NONE
438     * side effects - Adds given capability name and bit mask to
439     * current supported capabilities. This allows
440     * modules to dynamically add or subtract their capability.
441     */
442     void
443     add_capability(const char *capab_name, int cap_flag, int add_to_default)
444     {
445 michael 885 struct Capability *cap = MyMalloc(sizeof(*cap));
446 adx 30
447 michael 1646 cap->name = xstrdup(capab_name);
448 adx 30 cap->cap = cap_flag;
449     dlinkAdd(cap, &cap->node, &cap_list);
450 michael 885
451 adx 30 if (add_to_default)
452     default_server_capabs |= cap_flag;
453     }
454    
455     /* delete_capability()
456     *
457     * inputs - string name of CAPAB
458     * output - NONE
459     * side effects - delete given capability from ones known.
460     */
461     int
462     delete_capability(const char *capab_name)
463     {
464 michael 3335 dlink_node *ptr = NULL, *ptr_next = NULL;
465 adx 30
466 michael 3335 DLINK_FOREACH_SAFE(ptr, ptr_next, cap_list.head)
467 adx 30 {
468 michael 3335 struct Capability *cap = ptr->data;
469 adx 30
470 michael 3335 if (cap->cap)
471 adx 30 {
472 michael 3335 if (!irccmp(cap->name, capab_name))
473 adx 30 {
474 michael 2134 default_server_capabs &= ~(cap->cap);
475     dlinkDelete(ptr, &cap_list);
476     MyFree(cap->name);
477     MyFree(cap);
478 adx 30 }
479     }
480     }
481    
482 michael 896 return 0;
483 adx 30 }
484    
485     /*
486     * find_capability()
487     *
488     * inputs - string name of capab to find
489     * output - 0 if not found CAPAB otherwise
490     * side effects - none
491     */
492 michael 1877 unsigned int
493 adx 30 find_capability(const char *capab)
494     {
495 michael 896 const dlink_node *ptr = NULL;
496 adx 30
497     DLINK_FOREACH(ptr, cap_list.head)
498     {
499 michael 896 const struct Capability *cap = ptr->data;
500 adx 30
501 michael 896 if (cap->cap && !irccmp(cap->name, capab))
502     return cap->cap;
503 adx 30 }
504 michael 896
505     return 0;
506 adx 30 }
507    
508     /* send_capabilities()
509     *
510     * inputs - Client pointer to send to
511     * - int flag of capabilities that this server can send
512     * output - NONE
513     * side effects - send the CAPAB line to a server -orabidoo
514     *
515     */
516     void
517 michael 1632 send_capabilities(struct Client *client_p, int cap_can_send)
518 adx 30 {
519 michael 3246 char msgbuf[IRCD_BUFSIZE] = "";
520     char *t = msgbuf;
521 adx 30 int tl;
522 michael 3246 dlink_node *ptr = NULL;
523 adx 30
524     DLINK_FOREACH(ptr, cap_list.head)
525     {
526 michael 3246 struct Capability *cap = ptr->data;
527 adx 30
528     if (cap->cap & (cap_can_send|default_server_capabs))
529     {
530 michael 1793 tl = sprintf(t, "%s ", cap->name);
531 adx 30 t += tl;
532     }
533     }
534    
535 michael 319 *(t - 1) = '\0';
536 adx 30 sendto_one(client_p, "CAPAB :%s", msgbuf);
537     }
538    
539     /*
540     * show_capabilities - show current server capabilities
541     *
542     * inputs - pointer to a struct Client
543     * output - pointer to static string
544     * side effects - build up string representing capabilities of server listed
545     */
546     const char *
547 michael 2282 show_capabilities(const struct Client *target_p)
548 adx 30 {
549 michael 2309 static char msgbuf[IRCD_BUFSIZE] = "";
550 michael 2282 const dlink_node *ptr = NULL;
551 adx 30
552 michael 2309 strlcpy(msgbuf, "TS", sizeof(msgbuf));
553    
554 adx 30 DLINK_FOREACH(ptr, cap_list.head)
555     {
556     const struct Capability *cap = ptr->data;
557    
558 michael 2282 if (!IsCapable(target_p, cap->cap))
559     continue;
560    
561     strlcat(msgbuf, " ", sizeof(msgbuf));
562     strlcat(msgbuf, cap->name, sizeof(msgbuf));
563 adx 30 }
564 michael 1302
565     return msgbuf;
566 adx 30 }
567    
568     /* make_server()
569     *
570     * inputs - pointer to client struct
571     * output - pointer to struct Server
572     * side effects - add's an Server information block to a client
573     * if it was not previously allocated.
574     */
575     struct Server *
576     make_server(struct Client *client_p)
577     {
578     if (client_p->serv == NULL)
579     client_p->serv = MyMalloc(sizeof(struct Server));
580    
581     return client_p->serv;
582     }
583    
584     /* New server connection code
585     * Based upon the stuff floating about in s_bsd.c
586     * -- adrian
587     */
588    
589     /* serv_connect() - initiate a server connection
590     *
591 michael 2345 * inputs - pointer to conf
592 adx 30 * - pointer to client doing the connect
593     * output -
594     * side effects -
595     *
596     * This code initiates a connection to a server. It first checks to make
597     * sure the given server exists. If this is the case, it creates a socket,
598     * creates a client, saves the socket information in the client, and
599     * initiates a connection to the server through comm_connect_tcp(). The
600     * completion of this goes through serv_completed_connection().
601     *
602     * We return 1 if the connection is attempted, since we don't know whether
603     * it suceeded or not, and 0 if it fails in here somewhere.
604     */
605     int
606 michael 1632 serv_connect(struct MaskItem *conf, struct Client *by)
607 adx 30 {
608 michael 3246 struct Client *client_p = NULL;
609     char buf[HOSTIPLEN + 1] = "";
610 adx 30
611     /* conversion structs */
612     struct sockaddr_in *v4;
613 michael 3246
614 michael 1632 /* Make sure conf is useful */
615 michael 3246 assert(conf);
616 adx 30
617 michael 1632 getnameinfo((struct sockaddr *)&conf->addr, conf->addr.ss_len,
618 michael 1123 buf, sizeof(buf), NULL, 0, NI_NUMERICHOST);
619 michael 1632 ilog(LOG_TYPE_IRCD, "Connect to %s[%s] @%s", conf->name, conf->host,
620 adx 30 buf);
621    
622     /* Still processing a DNS lookup? -> exit */
623 michael 1632 if (conf->dns_pending)
624 adx 30 {
625 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
626 michael 992 "Error connecting to %s: DNS lookup for connect{} in progress.",
627     conf->name);
628 michael 3246 return 0;
629 adx 30 }
630    
631 michael 1632 if (conf->dns_failed)
632 michael 992 {
633 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
634 michael 992 "Error connecting to %s: DNS lookup for connect{} failed.",
635     conf->name);
636 michael 3246 return 0;
637 michael 992 }
638    
639 adx 30 /* Make sure this server isn't already connected
640 michael 1632 * Note: conf should ALWAYS be a valid C: line
641 adx 30 */
642 michael 3246 if ((client_p = hash_find_server(conf->name)))
643 michael 2345 {
644 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
645 michael 2134 "Server %s already present from %s",
646     conf->name, get_client_name(client_p, SHOW_IP));
647 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
648 michael 2134 "Server %s already present from %s",
649     conf->name, get_client_name(client_p, MASK_IP));
650 adx 30 if (by && IsClient(by) && !MyClient(by))
651 michael 3110 sendto_one_notice(by, &me, ":Server %s already present from %s",
652     conf->name, get_client_name(client_p, MASK_IP));
653 michael 2134 return 0;
654 adx 30 }
655 michael 2345
656 adx 30 /* Create a local client */
657     client_p = make_client(NULL);
658    
659     /* Copy in the server, hostname, fd */
660     strlcpy(client_p->name, conf->name, sizeof(client_p->name));
661 michael 1632 strlcpy(client_p->host, conf->host, sizeof(client_p->host));
662 adx 30
663     /* We already converted the ip once, so lets use it - stu */
664 michael 1115 strlcpy(client_p->sockhost, buf, sizeof(client_p->sockhost));
665 adx 30
666 michael 2345 /* create a socket for the server connection */
667 michael 3335 if (comm_open(&client_p->localClient->fd, conf->addr.ss.ss_family, SOCK_STREAM, 0, NULL) < 0)
668 adx 30 {
669     /* Eek, failure to create the socket */
670 michael 3335 report_error(L_ALL, "opening stream socket to %s: %s", conf->name, errno);
671    
672 adx 30 SetDead(client_p);
673 michael 3171 exit_client(client_p, "Connection failed");
674 michael 2134 return 0;
675 adx 30 }
676    
677     /* servernames are always guaranteed under HOSTLEN chars */
678     fd_note(&client_p->localClient->fd, "Server: %s", conf->name);
679    
680     /* Attach config entries to client here rather than in
681     * serv_connect_callback(). This to avoid null pointer references.
682     */
683 michael 1632 if (!attach_connect_block(client_p, conf->name, conf->host))
684 adx 30 {
685 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
686 michael 2134 "Host %s is not enabled for connecting: no connect{} block",
687     conf->name);
688 michael 2345 if (by && IsClient(by) && !MyClient(by))
689 michael 3110 sendto_one_notice(by, &me, ":Connect to host %s failed.", client_p->name);
690    
691 adx 30 SetDead(client_p);
692 michael 3171 exit_client(client_p, "Connection failed");
693 michael 2134 return 0;
694 adx 30 }
695    
696     /* at this point we have a connection in progress and C/N lines
697     * attached to the client, the socket info should be saved in the
698     * client and it should either be resolved or have a valid address.
699     *
700     * The socket has been connected or connect is in progress.
701     */
702     make_server(client_p);
703    
704     if (by && IsClient(by))
705     strlcpy(client_p->serv->by, by->name, sizeof(client_p->serv->by));
706     else
707     strlcpy(client_p->serv->by, "AutoConn.", sizeof(client_p->serv->by));
708    
709     SetConnecting(client_p);
710     dlinkAdd(client_p, &client_p->node, &global_client_list);
711 michael 3335
712 michael 1632 client_p->localClient->aftype = conf->aftype;
713 adx 30
714     /* Now, initiate the connection */
715 michael 2345 /* XXX assume that a non 0 type means a specific bind address
716 adx 30 * for this connect.
717     */
718 michael 1632 switch (conf->aftype)
719 adx 30 {
720     case AF_INET:
721 michael 1632 v4 = (struct sockaddr_in*)&conf->bind;
722 michael 3246 if (v4->sin_addr.s_addr)
723 adx 30 {
724     struct irc_ssaddr ipn;
725     memset(&ipn, 0, sizeof(struct irc_ssaddr));
726     ipn.ss.ss_family = AF_INET;
727     ipn.ss_port = 0;
728 michael 1632 memcpy(&ipn, &conf->bind, sizeof(struct irc_ssaddr));
729 michael 2134 comm_connect_tcp(&client_p->localClient->fd, conf->host, conf->port,
730 michael 2345 (struct sockaddr *)&ipn, ipn.ss_len,
731 michael 2134 serv_connect_callback, client_p, conf->aftype,
732     CONNECTTIMEOUT);
733 adx 30 }
734     else if (ServerInfo.specific_ipv4_vhost)
735     {
736     struct irc_ssaddr ipn;
737     memset(&ipn, 0, sizeof(struct irc_ssaddr));
738     ipn.ss.ss_family = AF_INET;
739     ipn.ss_port = 0;
740     memcpy(&ipn, &ServerInfo.ip, sizeof(struct irc_ssaddr));
741 michael 1632 comm_connect_tcp(&client_p->localClient->fd, conf->host, conf->port,
742 adx 30 (struct sockaddr *)&ipn, ipn.ss_len,
743 michael 1632 serv_connect_callback, client_p, conf->aftype,
744 michael 2134 CONNECTTIMEOUT);
745 adx 30 }
746     else
747 michael 2345 comm_connect_tcp(&client_p->localClient->fd, conf->host, conf->port,
748     NULL, 0, serv_connect_callback, client_p, conf->aftype,
749 adx 30 CONNECTTIMEOUT);
750     break;
751     #ifdef IPV6
752     case AF_INET6:
753     {
754 michael 2182 struct irc_ssaddr ipn;
755     struct sockaddr_in6 *v6;
756     struct sockaddr_in6 *v6conf;
757 adx 30
758 michael 2182 memset(&ipn, 0, sizeof(struct irc_ssaddr));
759     v6conf = (struct sockaddr_in6 *)&conf->bind;
760     v6 = (struct sockaddr_in6 *)&ipn;
761 adx 30
762 michael 3246 if (memcmp(&v6conf->sin6_addr, &v6->sin6_addr, sizeof(struct in6_addr)))
763 adx 30 {
764 michael 2182 memcpy(&ipn, &conf->bind, sizeof(struct irc_ssaddr));
765     ipn.ss.ss_family = AF_INET6;
766     ipn.ss_port = 0;
767     comm_connect_tcp(&client_p->localClient->fd,
768     conf->host, conf->port,
769 michael 2345 (struct sockaddr *)&ipn, ipn.ss_len,
770 michael 2182 serv_connect_callback, client_p,
771     conf->aftype, CONNECTTIMEOUT);
772     }
773     else if (ServerInfo.specific_ipv6_vhost)
774     {
775     memcpy(&ipn, &ServerInfo.ip6, sizeof(struct irc_ssaddr));
776     ipn.ss.ss_family = AF_INET6;
777     ipn.ss_port = 0;
778     comm_connect_tcp(&client_p->localClient->fd,
779     conf->host, conf->port,
780     (struct sockaddr *)&ipn, ipn.ss_len,
781     serv_connect_callback, client_p,
782     conf->aftype, CONNECTTIMEOUT);
783     }
784     else
785     comm_connect_tcp(&client_p->localClient->fd,
786 michael 2345 conf->host, conf->port,
787 michael 2182 NULL, 0, serv_connect_callback, client_p,
788     conf->aftype, CONNECTTIMEOUT);
789 adx 30 }
790     #endif
791     }
792 michael 2182 return 1;
793 adx 30 }
794    
795 michael 1303 #ifdef HAVE_LIBCRYPTO
796     static void
797     finish_ssl_server_handshake(struct Client *client_p)
798     {
799 michael 1632 struct MaskItem *conf = NULL;
800 michael 1303
801     conf = find_conf_name(&client_p->localClient->confs,
802 michael 1632 client_p->name, CONF_SERVER);
803 michael 1303 if (conf == NULL)
804     {
805 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
806 michael 1303 "Lost connect{} block for %s", get_client_name(client_p, HIDE_IP));
807 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
808 michael 1303 "Lost connect{} block for %s", get_client_name(client_p, MASK_IP));
809    
810 michael 3171 exit_client(client_p, "Lost connect{} block");
811 michael 1303 return;
812     }
813    
814 michael 2134 sendto_one(client_p, "PASS %s TS %d %s", conf->spasswd, TS_CURRENT, me.id);
815 michael 1303
816 michael 1632 send_capabilities(client_p, 0);
817 michael 1303
818     sendto_one(client_p, "SERVER %s 1 :%s%s",
819     me.name, ConfigServerHide.hidden ? "(H) " : "",
820     me.info);
821    
822     /* If we've been marked dead because a send failed, just exit
823     * here now and save everyone the trouble of us ever existing.
824     */
825     if (IsDead(client_p))
826     {
827 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
828 michael 1303 "%s[%s] went dead during handshake",
829     client_p->name,
830     client_p->host);
831 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
832 michael 1303 "%s went dead during handshake", client_p->name);
833     return;
834     }
835    
836     /* don't move to serv_list yet -- we haven't sent a burst! */
837     /* If we get here, we're ok, so lets start reading some data */
838     comm_setselect(&client_p->localClient->fd, COMM_SELECT_READ, read_packet, client_p, 0);
839     }
840    
841     static void
842 michael 1306 ssl_server_handshake(fde_t *fd, struct Client *client_p)
843 michael 1303 {
844 michael 2463 X509 *cert = NULL;
845     int ret = 0;
846 michael 1303
847 michael 2463 if ((ret = SSL_connect(client_p->localClient->fd.ssl)) <= 0)
848 michael 1303 {
849 michael 2463 switch (SSL_get_error(client_p->localClient->fd.ssl, ret))
850 michael 1303 {
851     case SSL_ERROR_WANT_WRITE:
852     comm_setselect(&client_p->localClient->fd, COMM_SELECT_WRITE,
853 michael 1308 (PF *)ssl_server_handshake, client_p, 0);
854 michael 1303 return;
855     case SSL_ERROR_WANT_READ:
856     comm_setselect(&client_p->localClient->fd, COMM_SELECT_READ,
857 michael 1308 (PF *)ssl_server_handshake, client_p, 0);
858 michael 1303 return;
859     default:
860 michael 1308 {
861     const char *sslerr = ERR_error_string(ERR_get_error(), NULL);
862 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
863 michael 1308 "Error connecting to %s: %s", client_p->name,
864     sslerr ? sslerr : "unknown SSL error");
865 michael 3171 exit_client(client_p, "Error during SSL handshake");
866 michael 1303 return;
867 michael 1308 }
868 michael 1303 }
869     }
870    
871 michael 2463 if ((cert = SSL_get_peer_certificate(client_p->localClient->fd.ssl)))
872     {
873     int res = SSL_get_verify_result(client_p->localClient->fd.ssl);
874 michael 3375 char buf[EVP_MAX_MD_SIZE * 2 + 1] = "";
875     unsigned char md[EVP_MAX_MD_SIZE] = "";
876 michael 2463
877     if (res == X509_V_OK || res == X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN ||
878     res == X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE ||
879     res == X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT)
880     {
881 michael 3375 unsigned int n = 0;
882 michael 2463
883     if (X509_digest(cert, EVP_sha256(), md, &n))
884     {
885 michael 3375 for (unsigned int i = 0; i < n; ++i)
886 michael 2463 snprintf(buf + 2 * i, 3, "%02X", md[i]);
887     client_p->certfp = xstrdup(buf);
888     }
889     }
890     else
891     ilog(LOG_TYPE_IRCD, "Server %s!%s@%s gave bad SSL client certificate: %d",
892     client_p->name, client_p->username, client_p->host, res);
893     X509_free(cert);
894     }
895    
896 michael 1303 finish_ssl_server_handshake(client_p);
897     }
898    
899     static void
900 michael 1632 ssl_connect_init(struct Client *client_p, struct MaskItem *conf, fde_t *fd)
901 michael 1303 {
902     if ((client_p->localClient->fd.ssl = SSL_new(ServerInfo.client_ctx)) == NULL)
903     {
904     ilog(LOG_TYPE_IRCD, "SSL_new() ERROR! -- %s",
905     ERR_error_string(ERR_get_error(), NULL));
906     SetDead(client_p);
907 michael 3171 exit_client(client_p, "SSL_new failed");
908 michael 1303 return;
909     }
910    
911     SSL_set_fd(fd->ssl, fd->fd);
912 michael 1306
913 michael 1632 if (!EmptyString(conf->cipher_list))
914     SSL_set_cipher_list(client_p->localClient->fd.ssl, conf->cipher_list);
915 michael 1306
916     ssl_server_handshake(NULL, client_p);
917 michael 1303 }
918     #endif
919    
920 adx 30 /* serv_connect_callback() - complete a server connection.
921 michael 2345 *
922 adx 30 * This routine is called after the server connection attempt has
923     * completed. If unsucessful, an error is sent to ops and the client
924     * is closed. If sucessful, it goes through the initialisation/check
925     * procedures, the capabilities are sent, and the socket is then
926     * marked for reading.
927     */
928     static void
929     serv_connect_callback(fde_t *fd, int status, void *data)
930     {
931     struct Client *client_p = data;
932 michael 1632 struct MaskItem *conf = NULL;
933 adx 30
934     /* First, make sure its a real client! */
935 michael 3246 assert(client_p);
936 adx 30 assert(&client_p->localClient->fd == fd);
937    
938     /* Next, for backward purposes, record the ip of the server */
939     memcpy(&client_p->localClient->ip, &fd->connect.hostaddr,
940     sizeof(struct irc_ssaddr));
941 michael 3246
942 adx 30 /* Check the status */
943     if (status != COMM_OK)
944     {
945     /* We have an error, so report it and quit
946     * Admins get to see any IP, mere opers don't *sigh*
947     */
948     if (ConfigServerHide.hide_server_ips)
949 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
950 adx 30 "Error connecting to %s: %s",
951     client_p->name, comm_errstr(status));
952     else
953 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
954 michael 2134 "Error connecting to %s[%s]: %s", client_p->name,
955     client_p->host, comm_errstr(status));
956 adx 30
957 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
958 michael 2134 "Error connecting to %s: %s",
959     client_p->name, comm_errstr(status));
960 adx 30
961     /* If a fd goes bad, call dead_link() the socket is no
962     * longer valid for reading or writing.
963     */
964     dead_link_on_write(client_p, 0);
965     return;
966     }
967    
968     /* COMM_OK, so continue the connection procedure */
969     /* Get the C/N lines */
970     conf = find_conf_name(&client_p->localClient->confs,
971 michael 2134 client_p->name, CONF_SERVER);
972 adx 30 if (conf == NULL)
973     {
974 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
975 michael 2134 "Lost connect{} block for %s", get_client_name(client_p, HIDE_IP));
976 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
977 michael 2134 "Lost connect{} block for %s", get_client_name(client_p, MASK_IP));
978 adx 30
979 michael 3171 exit_client(client_p, "Lost connect{} block");
980 adx 30 return;
981     }
982    
983     /* Next, send the initial handshake */
984     SetHandshake(client_p);
985    
986     #ifdef HAVE_LIBCRYPTO
987 michael 1632 if (IsConfSSL(conf))
988 michael 1303 {
989 michael 1632 ssl_connect_init(client_p, conf, fd);
990 michael 1303 return;
991     }
992 adx 30 #endif
993    
994 michael 2134 sendto_one(client_p, "PASS %s TS %d %s", conf->spasswd, TS_CURRENT, me.id);
995 adx 30
996 michael 1632 send_capabilities(client_p, 0);
997 adx 30
998 michael 2134 sendto_one(client_p, "SERVER %s 1 :%s%s", me.name,
999     ConfigServerHide.hidden ? "(H) " : "", me.info);
1000 adx 30
1001     /* If we've been marked dead because a send failed, just exit
1002     * here now and save everyone the trouble of us ever existing.
1003     */
1004 michael 2345 if (IsDead(client_p))
1005 adx 30 {
1006 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
1007 michael 2134 "%s[%s] went dead during handshake",
1008 adx 30 client_p->name,
1009 michael 2134 client_p->host);
1010 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
1011 michael 2134 "%s went dead during handshake", client_p->name);
1012 adx 30 return;
1013     }
1014    
1015     /* don't move to serv_list yet -- we haven't sent a burst! */
1016     /* If we get here, we're ok, so lets start reading some data */
1017     comm_setselect(fd, COMM_SELECT_READ, read_packet, client_p, 0);
1018     }
1019    
1020     struct Client *
1021     find_servconn_in_progress(const char *name)
1022     {
1023     dlink_node *ptr;
1024     struct Client *cptr;
1025    
1026     DLINK_FOREACH(ptr, unknown_list.head)
1027     {
1028     cptr = ptr->data;
1029    
1030     if (cptr && cptr->name[0])
1031 michael 1652 if (!match(name, cptr->name))
1032 adx 30 return cptr;
1033     }
1034 michael 2345
1035 adx 30 return NULL;
1036     }

Properties

Name Value
svn:eol-style native
svn:keywords Id Revision